The CISO Table: Deploying AI Agents Inside the Enterprise Trust Boundary, Safely.
Guest Speaker: Nic Chavez, former CISO (IBM, DataStax).
AI agents are starting to perform real operational work inside enterprise environments. That raises immediate CISO-level questions: who gets access, how it is time-bound, how actions are audited, and who owns liability when something goes sideways.
Join us for a private, off-the-record dinner for Fortune 1000 security leaders and their direct deputies. We’ll discuss practical governance patterns for deploying agentic AI safely inside the enterprise trust boundary, including:
• Guardrails for agents interacting with production systems
• Time-bounded access and identity controls for non-human actors
• Audit-grade logging and board accountability
• What breaks when governance lags capability
Expect thoughtful conversation, great food, and a few stories you probably will not hear on a conference stage.
Special Guest: Nic Chavez
Nic Chavez is a former Chief Information Security Officer at IBM and DataStax. At IBM, he served as CISO of Data and AI, focused on securing enterprise customer deployments of AI and data platforms across sectors. At DataStax, he served as CISO, partnering with security engineering, product leadership, and compliance to drive the company’s security and trust posture.
He has advised global financial institutions and large enterprises on integrating AI within complex regulatory environments, with a focus on enterprise trust boundaries, access control, auditability, and governance of AI-enabled systems. His work has included quantum-readiness initiatives in coordination with World Economic Forum working groups.
Today, Nic convenes senior security leaders to address a new operational challenge: deploying non-human systems that perform real work inside the enterprise without compromising identity controls, time-bounded access, audit integrity, or executive accountability.
Hosted by Serval
Serval is live at Fortune 50 scale, supporting agentic workflows inside enterprise security boundaries with provable guardrails and audit-grade controls.
